Internal Security Audit FAQ

Internal Security Audit FAQ

What is an Internal Security Audit?

An Internal Security Audit is where you have your network security tested by a third party. This test is carried out from within your network instead of remotely. This simulates actions of a disgruntled employee to highlight problems you may not have considered. Many companies have good internet protection but their internal system is often overlooked. This makes the internal threat from staff that they think they know and trust the most dangerous. These pose the biggest risk and it is important to ensure people only have access they need to do their job.

Why do I need an Internal Secuirty Audit?

Internal Security Audits help your business become more focused on the highest risk to the business. It will show you where you need to improve security and where you need to make changes. The internal threat is often the most dangerous to the business but is also most commonly ignored. It is also good to confirm that routine operations such as backups are working as expected.

1. Are your employees able to delete your client database?

2. Could they bring in a USB stick and copy your confidential information without anyone knowing?

3. Is someone running a chat server or gaming server on your network that you don’t know about?

4. Are users abusing the internet access by downloading large games, movies, music on the work internet?

5. Has my IT department correctly configured the network security?

6. Are my servers up to date and not exposed?

For answers to these questions you need an internal security audit.

What are the benefits of an Internal Security Audit?

The key benefits of having an Internal Security Audit are to find out what you don’t already know. You can expose areas of risk to the business that the business is not already aware of. Some of the internal risks are very high and have devastating side effects. We have seen instances of staff stealing company data on USB sticks. We have found work experience students running gaming servers on the business network. We have seen staff do things which had a significant impact on internet speed for the rest of the firm.
We have been invited to troubleshoot issues after a security breach has happened and seen things such as:
Rogue staff deleting data, editing payment information, altering bank information and other fraudulent activity.
We have caught staff running security scanners on the network to find holes in security. We have a lot of tales to tell from the internal threat. Therefore, get your IT checked by a third party regularly to ensure you don’t become a statistic.

How long does it take to carry out an Internal Security Audit?

Internal security audit time varies depending on the complexity of the network. However typically we would spend a couple of days on site analysing the system with minimal impact to the network users. Then we would write up your report and try to turn around your results within a week.

What is involved in an Internal Security Audit?

It involves one of our white hat ethical hackers coming on site and having access to the network with a normal user network account. Using this information, they will use their laptop to run a sequence of tests against your network environment to try and expose any common issues. It doesn’t matter where they are based as long as they have access to the network and can review the relevant systems. A report will be generated off site after the work has been completed and the results discussed with you in detail.

Latest News

It has been reported that hackers are trying to break into email accounts within the Scottish parliament (http://www.parliament.scot/). The unidentified hackers (https://www.theguardian.com/technology/hacking) are doing a similar attack to the one that happened against Westminster.
Holyrood ..

It has been reported that customers of the UK financial services company Ffrees (https://www.ffrees.co.uk/login), said they weren’t aware of any breaches until months after the event. 4 months after the event took place a security researcher got in touch with the people affected. The same ..

A potential state sponsored cyberattack that was aimed at 4000+ infrastructure firms has been blamed on a lone Nigerian cyber criminal. The campaign started back in April this year and it has targeted very large international organisations. The organisations are in the manufacturing, oil, gas, b ..